Effect of file sizes on encryption and decryption in constrained devices / Nurnadia Sapri
TCP protocol can be used in the transmission of data from one host to another host. Simply, it is unsecure because the attacker can break security parameters to obtain access to the data that currently being sent. As a communication and transmission of files over Internet has increased exponentially...
Saved in:
Main Author: | Sapri, Nurnadia |
---|---|
Format: | Thesis |
Language: | English |
Published: |
2015
|
Subjects: | |
Online Access: | https://ir.uitm.edu.my/id/eprint/68687/1/68687.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Security Study and Encryption / Decryption Method
by: Al-Qdah, Majdi Taysir
Published: (2000) -
The effectiveness of sun shading device for office tower in Malaysia / Zarina Mat Sapri
by: Mat Sapri, Zarina
Published: (2001) -
Comparative analysis of algorithms used in encryption and decryption /
by: Barahim, Ala'a Ebrahim Abobaker
Published: (2009) -
Final exam question paper data encryption and decryption using advance encryption standard / Khairul Nashran Nazari
by: Nazari, Khairul Nashran
Published: (2017) -
Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security
by: H. Belgassem, Seddeq
Published: (2004)